[go: up one dir, main page]

Avdoshin et al., 2018 - Google Patents

Bitcoin users deanonimization methods

Avdoshin et al., 2018

View HTML @Full View
Document ID
3340872526574264386
Author
Avdoshin S
Lazarenko A
Publication year
Publication venue
Труды Института системного программирования РАН

External Links

Snippet

Bitcoin is the most popular cryptocurrency on the planet. It relies on strong cryptography and peer-to-peer network. Bitcoin is gaining more and more popularity in criminal society. That is why Bitcoin is often used as money laundering tool or payment method for illegal products …
Continue reading at cyberleninka.ru (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Zhang et al. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage
Saleem et al. The anonymity of the dark web: A survey
Conti et al. A survey on security and privacy issues of bitcoin
Rahouti et al. Bitcoin concepts, threats, and machine-learning security solutions
Singh et al. SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
Herskind et al. Privacy and cryptocurrencies—A systematic literature review
Ogiela et al. Security of distributed ledger solutions based on blockchain technologies
Bojja Venkatakrishnan et al. Dandelion: Redesigning the bitcoin network for anonymity
Ali et al. ZombieCoin 2.0: managing next-generation botnets using Bitcoin
Plohmann et al. Case study of the miner botnet
Badsha et al. Privacy preserving location-aware personalized web service recommendations
Islam et al. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency
Li et al. EdgeWatch: Collaborative investigation of data integrity at the edge based on blockchain
Böck et al. Assessing the threat of blockchain-based botnets
Bhandari et al. Machine learning and blockchain integration for security applications
Avdoshin et al. Bitcoin users deanonimization methods
Yan et al. Blockchain abnormal behavior awareness methods: a survey
Klusman et al. Deanonymisation in ethereum using existing methods for bitcoin
Zhang Privacy evaluation of blockchain based privacy cryptocurrencies: A comparative analysis of Dash, Monero, Verge, Zcash, and Grin
Sayeed et al. On the effectiveness of blockchain against cryptocurrency attacks
Guan et al. Characterizing Ethereum address poisoning attack
Loudet et al. SEP2P: secure and efficient P2P personal data processing
Yu et al. Robust clustering of Ethereum transactions using time leakage from fixed nodes
Zhao Graph-based forensic investigation of bitcoin transactions
Andre et al. Smartor: Smarter tor with smart contracts: Improving resilience of topology distribution in the tor network